You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The lowest offset of CRYPTO frames in a QUIC packet does not necessarily start at zero, such as the second packet of a connection using Kyber key in the client hello.
Also updates clienthellod to new repo.
[](https://github.com/refraction-networking/uquic/actions/workflows/ginkgo_test.yml)
uQUIC is a fork of [quic-go](https://github.com/quic-go/quic-go), which provides Initial Packet fingerprinting resistance and other features. While the handshake is still performed by quic-go, this library provides interface to customize the unencrypted Initial Packet which may reveal fingerprint-able information.
8
+
9
+
uQUIC is a fork of [quic-go](https://github.com/quic-go/quic-go), which provides Initial Packet fingerprinting resistance and other features. While the handshake is still performed by quic-go, this library provides interface to customize the unencrypted Initial Packet which may reveal fingerprint-able information.
8
10
9
11
Golang 1.20+ is required.
10
12
@@ -13,43 +15,50 @@ If you have any questions, bug reports or contributions, you are welcome to publ
13
15
Development is still in progress and we welcome any contributions adding new features or fixing extant bugs.
14
16
15
17
# Disclaimer
16
-
This repository belongs to a large research project on how to fingerprint QUIC clients and how to mitigate such fingerprinting. We do not encourage any malicious use of this project's output, including this repository, [uTLS](https://github.com/refraction-networking/utls), and [clienthellod](https://github.com/gaukas/clienthellod).
17
18
18
-
Our research paper is still yet to be published and therefore this repository is neither ready for production use nor peer-reviewed. And the scope of our research is limited that such mimicry backed by this library MAY NOT be realisticly indistinguishable from the real QUIC clients being mimicked, and some misuses of this library MAY lead to easier fingerprinting against the mimic. We welcome any contributions to improve the realism of the mimicry, as well as expanding the scope of this project.
19
+
This repository belongs to a large research project on how to fingerprint QUIC clients and how to mitigate such fingerprinting. We do not encourage any malicious use of this project's output, including this repository, [uTLS](https://github.com/refraction-networking/utls), and [clienthellod](https://github.com/refraction-networking/clienthellod).
20
+
21
+
Our research paper is still yet to be published and therefore this repository is neither ready for production use nor peer-reviewed. And the scope of our research is limited that such mimicry backed by this library MAY NOT be realisticly indistinguishable from the real QUIC clients being mimicked, and some misuses of this library MAY lead to easier fingerprinting against the mimic. We welcome any contributions to improve the realism of the mimicry, as well as expanding the scope of this project.
19
22
20
-
For anyone intending to use this library for censorship circumvention, please be sure to understand the risks and limitations of this library.
23
+
For anyone intending to use this library for censorship circumvention, please be sure to understand the risks and limitations of this library.
21
24
22
25
If you are interested in our research, please stay tuned for our paper.
- [x] Google Chrome parrot (call for parrots w/ `Token/PSK`)
39
-
- [x] Mozilla Firefox parrot (call for parrots w/ `Token/PSK`)
40
-
- [ ] Apple Safari parrot
41
-
- [ ] Microsoft Edge parrot
43
+
-[x] Google Chrome parrot (call for parrots w/ `Token/PSK`)
44
+
-[x] Mozilla Firefox parrot (call for parrots w/ `Token/PSK`)
45
+
-[ ] Apple Safari parrot
46
+
-[ ] Microsoft Edge parrot
42
47
43
48
# Features
49
+
44
50
## Initial Packet fingerprinting resistance
51
+
45
52
uQUIC provides a mechanism to customize the Initial Packet, which is unencrypted and is almost unique to every QUIC client implementation. We provide an interface to customize the Initial Packet and makes the fingerprinting of QUIC clients harder.
46
53
47
54
### Build a QUIC Spec
48
-
A QUIC Spec sets parameters and policies for uQUIC in establishing a QUIC connection.
55
+
56
+
A QUIC Spec sets parameters and policies for uQUIC in establishing a QUIC connection.
49
57
50
58
See `u_parrot.go` for examples of building a QUIC Spec (parrot).
51
59
52
60
### Use a preset QUIC Spec
61
+
53
62
We provide a few preset QUIC Specs (parrots) for popular QUIC clients in `u_parrot.go`.
54
63
55
64
To use one, simple invoke `QUICID2Spec(id)`. See below for a complete example of using a preset QUIC Spec in an HTTP3 client.
0 commit comments